-
1
Vegetative status in patients with transient ischemic attack and stroke
Published 2018-06-01“…Presented work aims to study the status of the autonomic nervous system (ANS) in two groups of patients during 10-day acute period. One group consists of patients with transient ischemic attack (TIA) and another group consists of patients with stroke. …”
Get full text
Article -
2
Derived categories and the analytic approach to general reciprocity laws. Part I
Published 2005-01-01Get full text
Article -
3
-
4
-
5
-
6
Experiencing Traumatic Violence: An Interpretative Phenomenological Analysis of One Man’s Lived Experience of a Violent Attack Involving a Knife
Published 2025-01-01“…This case emphasises that the traumatic event is conceptualised as one part of a longer journey towards recovery, and that recovery itself is central to the experience of violent knife crime. …”
Get full text
Article -
7
-
8
-
9
Grievous Temporal and Occipital Injury Caused by a Bear Attack
Published 2013-01-01“…Bear attacks are reported from nearly every part of the world. …”
Get full text
Article -
10
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…The time complexity is one operation for a linear sum. Data for an MITM attack are two. …”
Get full text
Article -
11
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
Published 2017-01-01“…This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. …”
Get full text
Article -
12
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01“…Terror aims to disrupt peace and security of countries. Suicide attacks, a form of terrorism is carried out in many parts of the world today. …”
Get full text
Article -
13
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Published 2020-01-01Get full text
Article -
14
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Get full text
Article -
15
An Acute Transverse Myelitis Attack after Total Body Irradiation: A Rare Case
Published 2013-01-01Get full text
Article -
16
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
17
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
18
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
19
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
20
Derived Categories and the Analytic Approach to General Reciprocity Laws—Part II
Published 2007-01-01“…Building on the topological foundations constructed in Part I, we now go on to address the homological algebra preparatory to the projected final arithmetical phase of our attack on the analytic proof of general reciprocity for a number field. …”
Get full text
Article